Prescriptive Guidance on BMR vs System State By Data Source

Назначение: System Center Data Protection Manager 2010

This section provides guidance on how you can effectively use System Center Data Protection Manager 2010 (DPM) to protect your system information. The information is grouped by data source, so you can decide when to use BMR protection and when to use System State protection.

Unified Backup Strategy

File Servers

  • File system backup for data protection.

  • BMR backup for system protection.

  Recovery Strategy

Lost file data

File recovery using DPM

Lost or damaged operating system

System State recovery using BMR backup

Lost server (data volumes intact)

BMR recovery using BMR backup

Lost server (data volumes also lost)

BMR recovery followed by file recovery

SharePoint Farm

  • SharePoint farm backup for farm data.

  • BMR backup on Web front-end server to protect IIS role.

  • BMR or System State backup for servers hosting content database.

  Recovery Strategy

Lost site, lists, list items, documents

SharePoint recovery using DPM

Lost or damaged operating system

System State recovery using BMR backup

Disaster recovery

BMR recovery using BMR backup

Hyper-V Virtual Machines

  • Hyper-V host-level backup to protect virtual machines.

  • BMR backup of host computer at least once a day.

  Recovery Strategy

Lost virtual machine

Use Hyper-V recovery features

Lost or damaged operating system

System State recovery using BMR backup

Lost Hyper-V host (virtual machine intact)

BMR recovery using BMR backup

Lost Hyper-V host (virtual machine also lost)

BMR recovery followed by Hyper-V recovery

SQL Server or Exchange Server

  • Application backup to protect data.

  • BMR backup for system protection.

  Recovery Strategy

Lost application data

Application-specific recovery using DPM

Lost or damaged operating system

System State recovery using BMR backup

Lost server (database and transaction log files intact)

BMR recovery using BMR backup

Lost server (database and transaction log files also lost)

BMR recovery followed by application-specific recovery